Patent classifications
G06Q20/343
PAYMENT MILESTONES FOR IMPROVED FINANCIAL HEALTH
The disclosed technology provides enhanced financial statements such as credit statements that provide customized payment options to a customer that takes into account the total amount owed by the customer, and past payments made by the customer. The customized payment options are determined with the goal of providing more payment options that encourage financial health, while not overwhelming the customer with too many options or irrelevant options. The customized payment options can be displayed in an interactive user interface for paying a credit statement that can visually inform a user of the benefit of the respective payment options with respect to the impact of the respective payment option on the customer's financial health—at least as it pertains to a credit account for which the statement was issued.
COMPUTER-BASED SYSTEMS AND METHODS INVOLVING BIOMETRIC AUTHENTICATION ASPECTS FOR HANDLING EXCEPTIONS, ENABLING DEACTIVATION AND/OR PERFORMING OTHER FUNCTIONALITY
Systems and methods involving biometric authentication of transaction cards including aspects of exception handling, deactivation and other features are disclosed. In one embodiment, an exemplary implementation may involve generating a first user interface having one or more interactive UI elements that enable a card owner to manage a plurality of features associated with a transaction card, and determining, if a biometric-activated control is enabled and the vendor is not excluded from the biometric-activated control, whether the transaction card is biometrically-active. Further, the interactive UI elements may include elements such as a first UI element that is configured to allow the card owner to enable a biometric-activated control of the transaction card, and/or a second UI element that is configured to allow the card owner to exclude one or more vendors from the biometric-activated control.
Systems and methods for providing online and hybridcard interactions
Various embodiments are generally directed to authenticating a user for non-payment purposes utilizing a payment protocol, a computer device and a contactless card. The payment protocol may be consistent with an EMV standard. An application may determine that authorization or verification of a user may be required to access non-payment features of another application associated with the user and the computer device. The application may then receive and/or facilitate transmission of encrypted data from a communications interface of a contactless card associated with an account and utilizing either an offline or online technique to do so. The offline or online technique may involve one or more operations that can verify the identity of the user and/or otherwise authorize the user to have access to various aspects of the other application.
SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
Example embodiments of systems and methods for data transmission between a contactless card and a client device in support of a FIDO authentication are provided. In an embodiment, upon receipt of a challenge issued by a server in connection with a pending transaction, the contactless card may authorize the client device to utilize a FIDO private key to respond to the challenge. If the response to the challenge is successful, the FIDO authentication may proceed and the transaction may be completed.
PAYMENT MILESTONES FOR IMPROVED FINANCIAL HEALTH
The disclosed technology provides enhanced financial statements such as credit statements that provide customized payment options to a customer that takes into account the total amount owed by the customer, and past payments made by the customer. The customized payment options are determined with the goal of providing more payment options that encourage financial health, while not overwhelming the customer with too many options or irrelevant options. The customized payment options can be displayed in an interactive user interface for paying a credit statement that can visually inform a user of the benefit of the respective payment options with respect to the impact of the respective payment option on the customer's financial health—at least as it pertains to a credit account for which the statement was issued.
Smart card, method for outputting validation data, and method for responding to operation request
A smart card, a method for outputting validation data, and a method for responding to an operation request are provided. The method for outputting validation data includes acquiring an operation request by a smart card; acquiring smart card operation information of the smart card by the smart card, after acquiring the operation request, wherein the smart card operation information comprises at least a smart card mode factor for indicating a working mode of the smart card, and the working mode of the smart card comprises a non-contact communication mode and/or a contact communication mode; acquiring a validation data generating strategy, and using the validation data generating strategy to process at least the smart card operation information to obtain validation data by the smart card; outputting the validation data by the smart card after obtaining the validation data.
Securing a transaction by means of a smart card and smart card
Disclosed is a method of managing a smart card configured for securing a transaction with an external device via a card reader, the method including the following steps: incrementing at least one command counter of commands received by the smart card during a transaction; and depending on the current value of the at least one counter and a command profile, implementation of a smart card management command.
METHOD AND SYSTEM FOR USER AUTENTICATION USING VIRTUAL CODE FOR AUTHENTICATION
A method and system for user authentication by using an authentication virtual code are provided. A user authentication method using an authentication virtual code includes receiving, by a server, the authentication virtual code, searching, by the server, for an authentication card storage location, at which the authentication card is registered, in a storage location search algorithm based on the authentication virtual code, identifying, by the server, a user by extracting user information stored after being matched with the found authentication card storage location, verifying, by the server, an authentication virtual code based on a time point at which the authentication virtual code is received, and approving, by the server, user authentication.
TECHNIQUES TO CONTROL APPLETS FOR CONTACTLESS CARDS
Various embodiments are generally directed to techniques provide and control applets for transaction cards. More specifically, embodiments discussed here include permitting or denying applets of transaction cards based on whether they are enabled or disabled. Embodiments may also include enabling and disable applets for transaction cards.
TECHNIQUES TO CONTROL APPLETS FOR CONTACTLESS CARDS
Various embodiments are generally directed to techniques provide and control applets for transaction cards. More specifically, embodiments discussed here include permitting or denying applets of transaction cards based on whether they are enabled or disabled. Embodiments may also include enabling and disable applets for transaction cards.